USE CASES

SS8 BreachDetect in Action

PROACTIVE THREAT DETECTION

Quickly and easily identify any devices-of-interest that may have been compromised based on behavioral scoring on the network. Go even further into its records to find out whether it is exfiltrating data outside your organization, over which ports, where, and to whom.

TOTAL NETWORK VISIBILITY

Leverage SS8’s robust query and investigation workflow manually investigate some or all aspects of a recorded history of network traffic. This can include monitoring East/West traffic in and out of development labs, security operations centers, and even classified networks.

VALIDATING ENCRYPTED TRAFFIC

Identify encrypted sessions for a wide variety of applications. This includes the machine a user is trying to visit, Issuer common name, subject common name, validity start and end time, fingerprint, alternate names, SSL/TLS version used, session ID, certificate hashes, and much more.